Results 41 to 50 of about 2,362 (202)

Multi-Trace: Multi-level Data Trace Generation with the Cooja Simulator

open access: yes2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2021
Wireless low-power, multi-hop networks are exposed to numerous attacks also due to their resource-constraints. While there has been a lot of work on intrusion detection systems for such networks, most of these studies have considered only a few topologies, scenarios and attacks.
Finne, Niclas   +6 more
openaire   +3 more sources

Design and Implementation of Intrusion Detection Systems using RPL and AOVD Protocols-based Wireless Sensor Networks [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN.
Joseph Kipongo   +2 more
doaj   +1 more source

A handheld diagnostic system for 6LoWPAN networks [PDF]

open access: yes, 2017
The successful deployment of low-power wireless sensor networks (WSNs) in real application environments is a much broader exercise than just the simple instrumentation of the intended monitoring site. Many problems, from node malfunctions to connectivity

core   +2 more sources

An Integrated Simulation Module for Cyber-Physical Automation Systems

open access: yesSensors, 2016
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems.
Francesco Ferracuti   +3 more
doaj   +1 more source

RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols [PDF]

open access: yes, 2015
Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating wireless sensor networks (WSN) that are designed to be
Roussel, Kévin   +2 more
core   +4 more sources

Improved RAL routing protocol to identify duplicate packets in QoS

open access: yesMeasurement: Sensors, 2022
The area of study of motion control to Wireless Sensor Networks (WSN) was difficult. This study examines the problem of vehicular networks in the previously implemented IETF pathing algorithm standard to reduce power electricity WSN, the Routing ...
T.S. Sasikala   +5 more
doaj   +1 more source

Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Sensor node location information is critical in many Wireless Sensor Network (WSN) applications with random sensor node deployment. In such applications, node localization using a faster area exploration mechanism is needed to initiate precise sensing ...
Shamanth Nagaraju   +4 more
doaj   +1 more source

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

Enhancing IoT Performance via Using Mobility Aware for Dynamic RPL Routing Protocol Technique (MA-RPL) [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Nodes' aware-mobility in the Internet of Things (IoTs) stills open defy for researchers, due to the dynamic changing of routing path and networks’ resource limitations.
Ahmed R. Zarzoor
doaj   +1 more source

Evolving SDN for Low-Power IoT Networks [PDF]

open access: yes, 2018
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform.
Baddeley, Michael   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy